Sciweavers

828 search results - page 100 / 166
» Access Control in Location-Based Services
Sort
View
JSAC
2007
130views more  JSAC 2007»
14 years 9 months ago
Cross-layer QoS Analysis of Opportunistic OFDM-TDMA and OFDMA Networks
Abstract— Performance analysis of multiuser orthogonal frequency division multiplexing (OFDM-TDMA) and orthogonal frequency division multiple access (OFDMA) networks in support o...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo
SAINT
2007
IEEE
15 years 4 months ago
Towards a Mobile Peer-to-Peer Service Platform
Peer-to-Peer (P2P) technology is regarded as being disruptive for traditional fixed and mobile operators. However, it can also be considered as an opportunity for new ways of serv...
Wolfgang Kellerer, Zoran Despotovic, Maximilian Mi...
WISEC
2009
ACM
15 years 4 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz
ENTCS
2008
130views more  ENTCS 2008»
14 years 10 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
JHSN
2007
105views more  JHSN 2007»
14 years 9 months ago
A priority-aware CSMA/CP MAC protocol for the all-optical IP-over-WDM metropolitan area ring network
Abstract. The paper proposes a priority-aware MAC (Medium Access Control) protocol for a core metropolitan area network in the next generation Internet, which is an OPS (Optical Pa...
Jih-Hsin Ho, Wen-Shyang Hwang, Ce-Kuen Shieh